Articles
AKURASI PENJEJAKAN OBJEK DALAM BERAGAM RUANG WARNA
Gede Sukadarmika;
Dewa Made Wiharta;
Nyoman Putra Sastra
Jurnal Teknologi Elektro Vol 14 No 2 (2015): (July - December) Majalah Ilmiah Teknologi Elektro
Publisher : Program Studi Magister Teknik Elektro Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/MITE.2015.v14i02p15
The object trace has been a problem in estimating an object position when the object is moving due to the heavy influence of the uncertainty. Many researcher claim that color histogram is reliable feature to represent this object. . Different investigators use different color spaces in conducting research on tracking the object. So, there is no numerical comparison of the impact of the use of different color spaces to the successful tracking. This study compare the performance of tracking an object by using a different color space i.e.: RGB, HSV, and CIELAB. The performance is shown numerically by comparing the actual position of the object with the results of the estimation.
Kompresi Citra Medis dengan DWT dan Variable Length Code
I Gusti Ayu Garnita Darma Putri;
Nyoman Putra Sastra;
I Made Oka Widyantara;
Dewa Made Wiharta
Jurnal Teknologi Elektro Vol 20 No 2 (2021): (Juli-Desember) Majalah Ilmiah Teknologi Elektro
Publisher : Program Studi Magister Teknik Elektro Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/MITE.2021.v20i02.P02
This paper designed a medical image compression scheme using DWT with mother wavelet Coiflet and Symlet. Thresholding and quantization process are the key to lossy compression in this scheme, and the outputs will be coded with Huffman or Arithmetic coding. There are four different codec combinations namely: Coiflet-Huffman, Coiflet-Arithmetic, Symlet-Huffman, Symlet-Arithmetic. Compression performance of each codec will be analyzed based on PSNR and compression ratio. The compression testing used 3 grayscale medical images with dimension of 160x160 pixels. The most optimal PSNR dan rate are produced by Symlet-Aritchmetic codec with recommendation threshold value less than 12. Threshold value above 12 causes PSNR of the reconstruction image will be below the minimum PSNR stardard for digital image, which is of 30dB.
Perancangan Sistem Penyedia File Sharing dengan Enkripsi URL menggunakan Algoritma Rijndael
I Made Adi Bhaskara;
Dewa Made Wiharta;
Oka Saputra
Jurnal Teknologi Elektro Vol 19 No 2 (2020): (Juli - Desember) Majalah Ilmiah Teknologi Elektro
Publisher : Program Studi Magister Teknik Elektro Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/MITE.2020.v19i02.P08
Information in the digital era is growing very fast, seen from the rapid exchange of information. Information in the form of data or text is widely distributed and can be spread easily and quickly through the website. Generally a website uses website-based programming with the GET method where the GET method has a weakness of system data that can be seen in the access directory. This causes the data in the directory can be taken by unauthorized persons. Based on these problems the file sharing system provider was designed with URL encryption using the rijndael algorithm. The system provides services for sharing data and downloading data securely. Between the provider and recipient of the data each has an application that is an application to upload and an application to download and the admin is tasked with regulating the number of users of the application user. Existing data in the URL shared by the user upload application that has been in the form of an encrypted ciphertext with the shared rijndael algorithm can only be downloaded by the download application user. Each application has an authentication process where only registered users can access the application according to their respective roles. Research that has been done to get the results of encryption conducted on the upload application changes the URL into a ciphertext that can only be downloaded using a download application so that weaknesses in the GET method can be overcome. Keywords : GET method, encrypt, URL, rijndael algorithm, authentication, download, upload ciphertext
PERANCANGAN DAN PEMBUATAN SISTEM KONTROL DENGAN MEMANFAATKAN LAYANAN SMS TELEPON SELULAR BERBASIS MIKROKONTROLER AT89C51
N Putra Sastra;
Dewa Made Wiharta;
Agus Supranartha
Jurnal Teknologi Elektro Vol 4 No 2 (2005): (July - December) Majalah Ilmiah Teknologi Elektro
Publisher : Program Studi Magister Teknik Elektro Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
alah satu isu dalam masyarakat yang perlu dicermati adalah mengenai keamanan. Kasus kriminal seperti pencurian dapat dikurangi dengan memasang sistem pengaman pada properti yang hendak dijaga. Untuk itu, ditawarkan suatu sistem keamanan dengan pemanfaaatan layanan SMS yang merupakan salah satu fitur dari teknologi GSM yang dikontrol dengan suatu mikrokontroler. Pada penelitian ini dibuat suatu alat berupa aplikasi antara telepon seluler dengan mikrokontroler jenis ATMEL 89C51 dengan pemanfaatan layanan SMS. Proses kerja alat ini berupa pengiriman data dari mikrokontroler melalui telepon seluler berupa SMS ke telepon seluler lain untuk informasi tertentu. Telepon penerima dapat mengirimkan SMS berupa pesan perintah untuk menghidupkan atau mematikan alat yang dinginkan melalui mikrokontroler. Perancangan sistem kerja alat ini dengan pemanfaatan bahasa assembly dan kode PDU untuk pengiriman atau penerimaan SMS. Alat yang dirancang ini berjalan dengan baik, dimana mikrokontroler bereaksi terhadap input tertentu dan memberi suatu perintah untuk mengaktifkan telepon seluler untukmengirim SMS ke suatu nomor yang telah diatur sebelumnya.
Model Utilisasi Dan Visualisasi Resource Menggunakan Prometheus Dan Grafana Untuk Pengelolaan Server Di Universitas Udayana
Agus Permana Putra;
Gede Sukadarmika;
Dewa Made Wiharta
Jurnal Teknologi Elektro Vol 22 No 2 (2023): (Juli - Desember) Majalah Ilmiah Teknologi Elektro
Publisher : Program Studi Magister Teknik Elektro Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/MITE.2023.v22i02.P19
Monitoring utilization server which refers to the use of server resources such as CPU, memory and storage is important in managing Information Technology (IT) infrastructure by network administrators in an effort to help maximize server performance, identify performance constraints and make decisions to increase efficiency servers. Monitoring is done by checking resource usage one by one on the server to find out which server resources are running. However, the more servers there are, the more time it takes to monitor so that it can interfere with the performance of network administrators. To make it easier for network administrators to monitor, researchers created a resource utilization and visualization model using Prometheus and Graphana which can display server resources without having to check directly on the server you want to monitor. The final result of the research produced a model that can visualize server resources in a dashboard without the need to check the servers one by one so that it helps network administrators work to monitor server resource usage.
SISTEM VERIFIKASI SIDIK JARI DENGAN METODE PENCOCOKAN BERBASIS BANK GABOR FILTER
A.A. K. Oka Sudana;
D. M. Wiharta;
Mahardhika Tirta
Jurnal Teknologi Elektro Vol 5 No 2 (2006): (July - December) Majalah Ilmiah Teknologi Elektro
Publisher : Program Studi Magister Teknik Elektro Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Many cases of fraud are exposed where someone, claiming to be someone else attempts to accesssomething. This situation challenges us to create a system that is both reliable and trustworthy to verify someone’sidentity. A biometric system represent an automatic recognition system based on the physiological characteristicsand/or behaviors of the human being. One of these biometric system is fingerprint recognition. Fingerprint verification system is a system to verify a human fingerprint according to the identity which has been claimed. Thusfingerprint image input is compared with the reference fingerprint image which has been kept in a database,according to the given identity. On this research, the Gabor Filter Bank-based Fingerprint Matching Method is used to extract the image features.On application, one of sample image will be matched with one of the database reference image. First, before matching, the sample image features need to be calculate using the aforementioned method. The resulting matchingprocess will find a reference image which has the shortest Euclidean distance with the sample image. This matchingprocess will only succeed if the sample image and the reference image are from the same person. Images used inthis research are fingerprint images with dimension 191 x 191 pixels. This research is looking for the successful rateand the burst time on the verification process. Result of the system testing show that Gabor Filter Bank Method canprovide high enough success level i.e. 95%. The items influence success level are subject to quality of fingerprint image and accuracy to find a reference point/core point, Similarity between query image and reference image is determined by projection distance both of images, and also threshold value is used to decide whether this image isvalid or not.
KUNCI PINTU OTOMATIS MENGGUNAKAN APLIKASI RFID CARD
Dewa Made Wiharta;
Putu Ardana;
Frederik Nixon
Jurnal Teknologi Elektro Vol 7 No 2 (2008): (July - December) Majalah Ilmiah Teknologi Elektro
Publisher : Program Studi Magister Teknik Elektro Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Aplikasi Radio Frequency Identification (RFID) banyak dikembangkan dewasa ini. Salah satu aplikasi RFID yang dikembangkan disini adalah sebagai kunci pintu otomatis. RFID Reader digunakan untuk membaca ID yang terdapat pada kartu EM4100. Reader bekerja pada level tegangan 5V DC dengan frekuensi 125 KHz. Koneksi RFID Reader menggunakan media udara (wireless). Saat RFID tag didekatkan pada Reader maka reader akan membaca ID yang terdapat pada kartu. Output Reader merupakan input pada microcontroller AT89C51. Format data keluaran yang digunakan adalah ABA Track2 10 Desimal. Input data dari RFID Reader akan dibaca, disimpan, dan dibandingkan. Output dari microcontroller dihubungkan pada transistor PNP 9012 yang digunakan sebagai saklar dan terhubung dengan relay untuk menggerakkan kunci. Keadaan awal relay dan transistor adalah normally close dan cut-off, dan bekerja secara flip – flop sesuai dengan input dari microcontroller.
Implementasi Algoritma C5.0 pada Penilaian Kinerja Pegawai Negeri Sipil
Putu Wirya Kastawan;
Dewa Made Wiharta;
Made Sudarma
Jurnal Teknologi Elektro Vol 17 No 3 (2018): (September - Desember) Majalah Ilmiah Teknologi Elektro
Publisher : Program Studi Magister Teknik Elektro Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/MITE.2018.v17i03.P11
Employees become the spearhead of every Company, whether it is run the business on manufacture or service. The position and role of public government employees as an element of civil servant obligate them to provide fair public services. Refers to those facts, the performance of public government employees needs to be well managed. The algorithm C5.0 is one of the decision tree algorithm which can process the employees performance data become an input for decision-making. Based on evaluation result of 184 employees performance datas, there was a high accurracy data in level 96.08%. Due to that result, the algorithm system can be developed become e-performance system which can predict or giving an advice in order to decision-making processes whether for assigning promotion, ranking or giving performance allowances.
Perancangan RESTful API Menggunakan Java Quarkus Untuk Modul Mahasiswa Pada Layanan SIMAK-NG Universitas Udayana
Ari Wijaya I Kadek;
Dewa Made Wiharta;
Nyoman Putra Putra Sastra
Jurnal Teknologi Elektro Vol 21 No 2 (2022): (Juli - Desember) Majalah Ilmiah Teknologi Elektro
Publisher : Program Studi Magister Teknik Elektro Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/MITE.2022.v21i02.P12
Information systems are very important in today's technological era. The services or methods used to deliver information are always evolving to provide better services. SIMAK-NG Udayana University is an information system built by the Udayana University Resources and Information Unit (USDI) to provide convenience to users (academic operators, lecturers and students) in online academic administration activities, which is Integrated Information System, known as Integrated Management Information System the Strategic of Udayana (IMISSU). Previously built on a monolithic architecture, SIMAK-NG migrate the service architecture to microservices. Therefore, need to customize the program code by implementing a RESTful API that supports the performance of SIMAK-NG service. In this study, the design of a RESTful API model was made This can be used by other applications that require student data from the SIMAK service and access RESTful API services instead of accessing the database directly. API was built using the Java programming language, the Quarkus framework, and a database schema that matched the database at the SIMAK-NG service at Udayana University. The test was run locally and show that the RESTful API program's response results are as designed and work well as shown in the tests using the Postman script. this indicates that the designed API program is ready for implementation.
Spatial-temporal data imputation for predictive modeling in intelligent transportation systems
Widi Prasetyo, Yohanes Pracoyo;
Linawati, Linawati;
Wiharta, Dewa Made;
Sastra, Nyoman Putra
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 2: May 2025
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v38.i2.pp794-807
Data imputation is necessary to overcome data loss in intelligent transportation systems (ITS) due to the many sensors used to monitor traffic conditions. Sensor malfunction, hardware limitations, and technical glitches can lead to incomplete data, potentially leading to errors in traffic data analysis. This analysis investigated spatial-temporal data imputation approaches applied for predictive modeling in ITS. Each approach's strengths, weaknesses, and applicability in the context of ITS are evaluated. We analyzed various imputation approaches involving statistical, machine learning, and combined methods. Statistical methods are more straightforward but could effectively handle modern traffic's complexity. On the other hand, machine learning and combined approaches, such as hybrid convolutional neural network (CNN)- long short-term memory (LSTM), offer more robust capabilities in capturing non-linear patterns present in spatio-temporal data. This research aims to investigate the effectiveness of each approach in overcoming data incompleteness and the accuracy of predicting future traffic conditions with the widespread adoption of IoT, electric vehicles, and autonomous vehicles. The results of this investigation provide an understanding of the most suitable approaches to address the challenges of spatio-temporal data imputation and provide practical guidance for predictive modeling in ITS.